How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote host is affected by multiple vulnerabilities.
The remote host is running a version of Palo Alto Networks PAN-OS 5.x
prior to 5.0.9. It is, therefore, affected by multiple
- A security bypass vulnerability exists due to a failure
to properly enforce RADIUS users' permissions. An
authenticated attacker can exploit this to modify shared
objects. (Ref# 55287)
- A cross-site request forgery vulnerability exists due
to a failure to properly validate HTTP requests to
certain file upload forms, including
- Multiple HTML injection vulnerabilities exist due to a
failure to sanitize user-supplied input to the 'Name',
'Subject', and 'Issuer' fields in imported certificates.
An attacker can exploit this to inject arbitrary HTML
into the device's web interface.
See also :
Upgrade to PAN-OS version 5.0.9 or later.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.1
Public Exploit Available : true
Family: Palo Alto Local Security Checks
Nessus Plugin ID: 72829 ()
Bugtraq ID: 6398464602
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.